Several vulnerabilities have been discovered in sudo, a program designedto allow a sysadmin to give limited root privileges to users. The CommonVulnerabilities and Exposures project identifies the following problems:

CVE-2013-1775

Marco Schoepl discovered an authentication bypass when the clock is set to the UNIX epoch [00:00:00 UTC on 1 January 1970].

CVE-2013-1776

Ryan Castellucci and James Ogden discovered aspects of an issue that would allow session id hijacking from another authorized tty.

For the stable distribution (squeeze), these problems have been fixed inversion 1.7.4p4-2.squeeze.4.

For the testing (wheezy) and unstable (sid) distributions, these problemshave been fixed in version 1.8.5p2-1+nmu1.

We recommend that you upgrade your sudo packages.

Further information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: http://www.debian.org/security/